Copy-move forgery detection and localization by means of robust clustering with J-Linkage

被引:223
作者
Amerini, Irene [1 ]
Ballan, Lamberto [1 ]
Caldelli, Roberto [1 ]
Del Bimbo, Alberto [1 ]
Del Tongo, Luca [1 ]
Serra, Giuseppe [1 ,2 ]
机构
[1] Univ Florence, Media Integrat & Commun Ctr MICC, I-50134 Florence, Italy
[2] Univ Modena & Reggio Emilia, Dipartimento Ingn Enzo Ferrari, I-41125 Modena, Italy
关键词
Digital image forensics; Tampering detection; Copy-move detection; Copy-move localization; IMAGE; FEATURES; DCT;
D O I
10.1016/j.image.2013.03.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Understanding if a digital image is authentic or not, is a key purpose of image forensics. There are several different tampering attacks but, surely, one of the most common and immediate one is copy-move. A recent and effective approach for detecting copy-move forgeries is to use local visual features such as SIFT. In this kind of methods, SIFT matching is often followed by a clustering procedure to group keypoints that are spatially close. Often, this procedure could be unsatisfactory, in particular in those cases in which the copied patch contains pixels that are spatially very distant among them, and when the pasted area is near to the original source. In such cases, a better estimation of the cloned area is necessary in order to obtain an accurate forgery localization. In this paper a novel approach is presented for copy-move forgery detection and localization based on the J-Linkage algorithm, which performs a robust clustering in the space of the geometric transformation. Experimental results, carried out on different datasets, show that the proposed method outperforms other similar state-of-the-art techniques both in terms of copy-move forgery detection reliability and of precision in the manipulated patch localization. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:659 / 669
页数:11
相关论文
共 30 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2004, ADVENT TECHNICAL REP
[3]  
[Anonymous], P IEEE ICME BEIJ CHI
[4]  
[Anonymous], P EUSIPCO GLASG SCOT
[5]  
[Anonymous], P IEEE ICASSP DALL T
[6]  
[Anonymous], P INT WORKSH INF HID
[7]  
[Anonymous], P IEEE ICASSP WASH D
[8]  
Bashar M, 2010, IEEE Trans Image Process, DOI 10.1109/TIP.2010.2046599
[9]  
Christlein V, 2010, P IEEE WIFS SEATTL W
[10]   Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25